Hear Shawn Tuma interviewed on News Radio 570 KLIF - Experts: Update Settings and Download Updates to Protect from “Meltdown” and “Spectre” CLICK HERE if you are impatient and only want to know what you should do ASAP to protect against Spectre and Meltdown With Y2K we had a warning. So much of a warning that … Continue reading Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?
In the last quarter of 2017, I have observed a cybersecurity trend that has given me more hope than any that I have seen previously. Let me explain. As an attorney, I have been practicing what can generally be described as cyber law or cybersecurity law since 1999, which means that my practice has evolved a lot … Continue reading The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years!
Cybercriminals need shopping money for the Holidays and one of their favorite times to get yours is when you are shopping on #CyberMonday. https://youtu.be/ZPIEiQVQZ2I?t=31s Use these tips to help stay #cybersecure while shopping online for #CyberMonday and at any other time: Credit or debit? Use credit cards, not debit cards, for your online shopping. Debit cards … Continue reading Tips for Staying #CyberSecure While Shopping Online for #CyberMonday
Basic cyber hygiene has been a hot topic in cybersecurity, and for good reason. Most of the incidents that impact companies start with failures of basic cyber hygiene, not the super-sophisticated stuff of the movies. See Start with Cybersecurity Basics: Confirmed by Verizon's 2016 Data Breach Report. One of the most fundamental rules of cyber hygiene is … Continue reading Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene
As a teaser to my presentation at SecureWorld - Dallas last week, I did a brief interview with SecureWorld and talked about three of the points I would make in my lunch keynote, The Legal Case for Cybersecurity. If you're going to SecureWorld - Denver next week, join me for the lunch keynote on Thursday (11/2) … Continue reading 3 Legal Points for InfoSec Teams to Consider Before an Incident